Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes Cisco IOS Release 12.2(52)SE and later
8
Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(52)SE
515765-003
Limitations and Restrictions
• A traceback error occurs if a crypto key is generated after an SSL client session.
There is no workaround. This is a cosmetic error and does not affect the functionality of the switch.
(CSCef59331)
• When system jumbo MTU size is configured on a switch and the egress ports can support jumbo
frames, the egress SPAN jumbo frames are not forwarded to the SPAN destination ports.
There is no workaround. (CSCsj21718)
Ethernet
Subnetwork Access Protocol (SNAP) encapsulated IP packets are dropped without an error message being
reported at the interface. The switch does not support SNAP-encapsulated IP packets. There is no
workaround. (CSCdz89142)
HSRP
When the active switch fails in a switch cluster that uses HSRP redundancy, the new active switch might
not contain a full cluster member list. The workaround is to ensure that the ports on the standby cluster
members are not in the spanning-tree blocking state. To verify that these ports are not in the blocking
state, see the “Configuring STP” chapter in the software configuration guide. (CSCec76893)
IP
When the rate of received DHCP requests exceeds 2,000 packets per minute for a long time, the response
time might be slow when you are using the console. The workaround is to use rate limiting on DHCP
traffic to prevent a denial of service attack from occurring. (CSCeb59166)
IP Telephony
This is the IP telephony limitation:
After you change the access VLAN on a port that has 802.1x enabled, the IP Phone address is
removed. Because learning is restricted on 802.1x capable ports, it takes approximately 30 seconds
before the address is relearned. No workaround is necessary. (CSCea85312)
Multicasting
These are the multicasting limitations:
• If the number of multicast routes and Internet Group Management Protocol (IGMP) groups are more
than the maximum number specified by the show sdm prefer global configuration command, the
traffic received on unknown groups is flooded in the received VLAN even though the show ip igmp
snooping multicast-table privileged EXEC command output shows otherwise. The workaround is
to reduce the number of multicast routes and IGMP snooping groups to less than the maximum
supported value. (CSCdy09008)
• IGMP filtering is applied to packets that are forwarded through hardware. It is not applied to packets
that are forwarded through software. Hence, with multicast routing enabled, the first few packets are
sent from a port even when IGMP filtering is set to deny those groups on that port. There is no
workaround. (CSCdy82818)